|  | | Time slot over-subscribed |  | Summit Onboarding Maulden room |  | Track Introductions Larch room | 
 | | Time slot over-subscribed |  | OWASP Defect Dojo Maulden room |  | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room |  | Creation of Security Buttons Pedley room | 
 | | OWASP DevSecOps Studio Maulden room | 
 | | Integrating Security Tools in the SDL Maulden room | 
 | | Using Jira to handle Incident Response - simulations | 
 | 
|  | | A seat at the table main-stage | 
 |  |  |  |  | 
|  | | Integrating Security Tools in the SDL using OWASP DevSecOps Studio Maulden room | 
 | | Time slot over-subscribed |  | Akamai WAF & Ruleset Pedley room |  | DevSecOps Maturity Model (DSOMM) Maulden room |  | Agile Practices for Security Teams Larch room | 
 | | Time slot over-subscribed |  | Creating Appsec metrics and visualisation Maulden room |  | AWS Lambda Security Portland room | 
 | | Time slot over-subscribed |  | From Threat Modeling to DevSecOps metrics Maulden room |  | Hands-on GDPR Patterns Portland room |  | Cell based Structures for Security Larch room | 
 |  | 
|  |  |  | | SOC Monitoring Visualisation Maulden room | 
 | | Securing the CI Pipeline Maulden room | 
 |  | 
|  |  |  |  |  |  | 
|  |  | | Replacing Akamai with AWS Shield Table 5 | 
 |  |  |  | 
|  | | SAMM DevSecOps Version 311 - OWASP SAMM villa | 
 |  |  |  |  | 
|  |  | | Using Threat Models for GDPR 317 - Photobox villa | 
 |  |  |  |